No. |
Title and Author |
Area |
Country |
Page |
51 |
Abatement of Traffic Congestion on Multilane Highway
-Kritika Rajput ; Prof. Buddhartna Godboley
Congestion is one of the supreme problem in maneuvering of traffic on highway This paper presents an analysis of traffic congestion issues in NAGPUR CITY and studied for finding out the reasons and solution of problems. The increase in different types of vehicles on the roads has caused a major reason the accidents. The traffic in developing nations like India is highly different types of vehicles, different sizes, different shapes, different speeds and different operating vehicles sharing the same roads. A research is found out, based on the measurement such as road accidents, traffic volume, traffic speed and density. This paper analysis of traffic congestion on urban road for the selected patch and congestion analysis through the HCS-2000 (Highway capacity software). This paper focus has only been on traffic congestion measure and reduces congestion and To avoid accidents and to save human life and To develop proper solutions for congestion. Read More...
|
Transportation Engineering |
India |
188-191 |
52 |
Upgradation of the Existing Urban Infrastructure to Achieve Standards of Comprehensively Developed Smart City
-Pradnya B. Ghavle ; Dr. B. V. Khode
A smart city is that city which uses technology to make most favorable utilization of resources to build cities more efficient, people-centric and sustainable. If we observe, in the two last decades, urban infrastructure in most of the Indian cities has been in many aspects upgraded. Current expressways, flyovers, bridges and airports can be traced at most of the big cities in the country. But, the urban services quality has not kept rate of knots with the population explosion into our major urban centers. Overcrowding leaded to space crunch, which is resulted due to lack of scientific and effective utilization of spaces. A smart city is accredited by smartness all along multiple parameters, with smart governance executing a master role in assisting each of them. Government of India has taken an initiative to build up 100 cities as smart cities. Main gears of development based on area within the Smart Cities Mission includes city enhancement (retrofitting), replenishment of city (redevelopment) and city extensions (Greenfield development/growth) along with an initiative of Pan-city development which confirms covering larger parts of the city, Smart Solutions are applied. In this paper, research is carried out in Orange city- Nagpur. In the year 1818 fort built on the twin hills of Sitabuldi, the town is dominated by the British, located at centre of the city. Zone 2 Dharampeth, is studied for this research among 10 main zones of the city. Research design, adopted is Maxwell’s Interactive model which both had order, nor directionality and would facilitate us to not only expand an understanding of the definite structure of our study, but also to graph our study and carry it out (Maxwell 2005). To craft a smart city, this paper studies the strategic outline identified four broad escalation direct solutions: building a new sustainable city, movement people and not of vehicles, achieving accomplishment in providing citizen services, and reformation economy. Read More...
|
Transportation Engineering |
India |
192-203 |
53 |
Predicting Emergency Department Visits for Asthma-Related Issues Using Online Networking
-Priyadarshini.M.R ; Chandrakala.H.L
Asthma is a chronic incendiary issue of the aviation routes described by an airflow obstruction which cannot be completely cured, but appropriate measures could be taken to avoid or to control One such solution to treat the patients affected by asthma would be to send an Emergency Department. By doing so the patients could get treatment when needed and can be directed towards not so much excessive but rather more effective consideration locales. The main aim here is to predict the Emergency Department visits for asthma-related issues at constant or close ongoing using online networking such as Twitter information, Google search interests and Environment sensor data. Given these three information as input accurate results of the location where many people are affected can be obtained. Read More...
|
Computer Science and Engineering |
India |
204-206 |
54 |
Novel Approach for Mining E-Commerce Feedback Comments Using Comm Trust Data Mining Algorithm
-Suraj Nagnath Gund ; Akash Gaykwad; Payal Nikam; Akshada Patil; Prof. Pankaj Agarkar
Now a day’s E-commerce applications like flip card, Amazon, shop clues are more popular. On that site there are number of sellers or products And many users purchases the number of product from E-commerce sites. But user getting the problem to select the trustworthy sellers. For that we develop the proposed system to guide the users in a proper way so that they can choose the correct seller between the different available sellers on E-commerce. There are different sellers as per their services and quality they provide product to users. User can give review for particular dimensions of sellers such as quality, service, delivery etc. Review can be negative or positive and to calculate the final score of each sellers in particular dimensions we used different technique. So here we represent the opinion miming, aspect miming for the review mining or feedback mining. Read More...
|
Computer Engineering |
India |
207-209 |
55 |
Character recognition of Sindhi (Arabic) Script
-Deepak Garg
Optical Character Recognition is a wide area of research and is used in various applications. This paper proposes a new technique of optical character recognition using Recursive Subdivision Method. This method is very effective with the use of Recursive Subdivision Method for feature extraction. The model proposed is trained and validated for Arabic script and the results are found to be very good. The model developed works for the entire character set. Read More...
|
Computer Science and Engineering |
India |
210-211 |
56 |
Implementing Fault Ride-Through support for a Offshore Wind Farm fed VSC-HVDC system
-Sarath S ; Dr.R.Karthik
Developing large Offshore Wind Farms (OWFs) represent an efficient and reliable power generation. To improve the efficiency of such OWFs, Voltage Source Converter based High Voltage DC transmission (VSC based HVDC) system is used. However, the VSC-based HVDC transmission systems are subjected to DC faults frequently, and dc circuit breakers of higher rating are required to provide protection against such faults. Hence the Offshore Wind farms integrated by VSC-HVDC are expected to have fault ride-through (FRT) capability during such DC fault conditions. This research work proposes a VSC based HVDC system provided with a Fault Tolerant Breaker (FTB), in between the DC line in order to limit the DC fault current. This provides an efficient and reliable power transfer in the system without disturbing the power supply during any such DC fault conditions. The simulations are performed through MATLAB/Simulink software and results were obtained. Read More...
|
Electrical Engineering |
India |
212-216 |
57 |
Reactive Power Compensation of Doubly Fed Induction Generator Using STATCOM in Grid Side
-Mathusoothanan T ; Dr.R.Karthik
Wind energy generation with Doubly Fed Induction Generator is a dominant factor in wind forms. High penetration and variable fault conditions DFIG absorbs more reactive power from the grid. Applying a set of optimized control parameters, the reactive power of the systems shall be further enhanced. Due to presence of variable load with fault conditions reactive power is varied in the system. Varied reactive power is compensated by the Static Synchronous Compensator (STATCOM). In DFIG, the Real and reactive power are modified based on rotor speed and load variations. The simulation result shows the effectiveness and performance of the DFIG with Static Synchronous Compensator (STATCOM) with their control techniques. Read More...
|
Electrical Engineering |
India |
217-220 |
58 |
A Low Complexity and Highly Robust Multiplier Design Using Adaptive Hold Logic
-Vaishak Narayanan ; Mr.G.RajeshBabu
This project deals with Aging Aware Reliable multiplier design with adaptive hold logic, Digital multipliers is one of the major unit in arithmetic functional units. The overall performance of the AHL systems depends on the throughput of the multiplier. Even though the negative bias temperature instability effect occurs when a pMOS transistor is under negative bias voltage, it leads in the increasing threshold voltage of the pMOS transistor and it will reduce the speed of the multiplier design. Hence like this the positive bias temperature instability occurs when an nMOS transistor is under positive bias. These two effects degrade transistor speed, and in the long term the system may fail due to timing violations. Hence it is important to design reliable high performance multipliers. In this project we propose an aging aware multiplier design with an adaptive hold logic circuit. By this the multiplier is able to provide higher throughput through the variable latency and can adjust adaptive hold logic circuit to mitigate performance degradation that is due to aging effect. Read More...
|
VLSI |
India |
221-225 |
59 |
Experimental and CFD Analysis of Helical Coil Tube Heat Exchanger
-Mangesh Subhash Mule ; Dr.J.A.Hole
Now a day the important of heat exchangers is increasing in many areas. Heat exchangers are the important equipments with a variety of industrial applications including power plants, chemical, refrigeration and air conditioning industries. Especially Helically coiled heat exchangers are used in order to obtain a large heat transfer area per unit volume. In this study the heat transfer coefficients of shell and helically coiled tube heat exchangers are investigated experimentally. Three heat exchangers with different coil pitches are selected as test section for both parallel-flow and counter-flow configurations. All the required parameters like inlet and outlet temperatures of tube-side and shell-side fluids, flow rate of fluids, etc. Is to be measured using appropriate instruments Read More...
|
Mechanical Engineering |
India |
226-228 |
60 |
Video Caching in Radio Access Network
-Rinu Anna Varghese
Effective caching of videos at the base stations of the Radio Access Network (RAN) can be used to significantly improve the video capacity and user experience of mobile networks. Several caching algorithms can be used to ensure the effectiveness of RAN caches. Here, we discuss the several algorithms used for caching in the RAN. Read More...
|
Electronics & Communication Engineering |
India |
229-231 |
61 |
Improving quality of image in Permutation-Only Image Encryption Schemes
-APARNA N ; Mrs kavyashree
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for protection of multimedia data. In permutation only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator (PRNG). The literature on the cryptanalysis of image ciphers indicates that permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen plaintext attacks. In our proposed work we intend to develop the cipher data by considering two encryption algorithm concerning Arnold Cap Map (ACM) and Chaotic sequential data. In this work we intend to improve the PSNR value of the image. Read More...
|
Computer Science and Engineering |
India |
232-235 |
62 |
Comparison on privacy-preserving detection of sensitive Data Exposure
-P.Lalitha ; G.Saranya
Recently security firms, Government organizations and other research scholars identifies that data leakage is common in fields where sensitive data are stored and processed. And it is analyzed that data leakage is been growing rapidly, in which human errors are one of the main causes of data loss. The common approach in detecting data leak screens the content in storage and transmission that expose sensitive information. The approach usually requires the detection operation to conduct the secrecy. And there exists lot of techniques, algorithms to find data leakage and provide alerts to the organization. The data leak detection(DTD) privacy –preserving solution solves through the special set of sensitive data digest in the detection. The data leak detection systems were proposed to detect data in small scale and large scale organizations with fuzzy fingerprints. In this paper, we review the data leak detection mechanisms. Read More...
|
Computer Science |
India |
236-238 |
63 |
Seismic Analysis of Unsymmetrical Building using Supplemented Device
-Milin N. Rajkotia ; Prof. S. S. Sanghai
Dampers are the supplemented device which are used in the structure to dissipate the energy against the ground movement. Of which, Friction damper consists of steel plates which dissipate energy by sliding against each other in opposite direction. The aim of this research program is to analyse the building with and without friction damper subjected seismic loading with unsymmetrical plan. The first step of this project is to study the design parameters of the friction dampers. The modelling is carried out using software SAP2000. In addition, different parameters such as base shear, axial force, shear force, torsional moment, bending moment, fundamental time period, energy dissipation of bare frame and friction-damped frame has been studied. Read More...
|
Civil Engineering |
India |
239-242 |
64 |
Seismic Behaviour of Honeycomb Structure with Conventional Structure by using STAAD Pro
-Ankita Shrikant Rode ; Dr. Prashant Y. Pawade
Tall buildings are very common these days because of the main advantage that these buildings use land very efficiently. The study is about honey combed system which also known as the hexagrid structural system used in tall structure construction. This paper deals with the technique and its effect on the normal conventional type structure. The response of the building with the seismic forces is studied. The comparative analysis is done by using software based results. All over the world new innovations are been done by researchers so as to minimize the structural and environmental damage to the society. This technique used in this paper is one of such newly evolved technique by using which a software based experiment is carried out to check the effect various seismic parameters are considered. Read More...
|
Structural Engineering |
India |
243-245 |
65 |
HYBRID APPROACH FOR SECURE DATA COMMUNICATION FOR DECENTALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
-MAHESH KRISHNAN ; REVATHY M.S.; SONYMOL K.M.; TAINU RAJU; SUMY JOSEPH
The information and communication technology of the present world has reached unimaginable progress breaking almost all the boundaries of imagination once perceived by the ancient man. Cryptography thus becomes an important area which provides the security of these pieces of information. The term Symmetric Cryptography employs the same key at the both ends of a message communication i.e. for both encryption and decryption. With the recent chains of calamitous events and enemy attacks, the thought of providing and supplying strong and almost never failing Disruption Tolerant Networks had been a major concern in most technocratic minds and information industries all over. The military networks share the same concern. Although a lot of encryption standards such as the DES, RSA and so on exist, none prove to be a widely accepted promising cryptographic solution like the Cipher text-policy attribute-based encryption (CP-ABE) to the access control issues. The proposed approach uses a novel method integrating the CP-ABE scheme along with fingerprint authenticated key distribution, thus the title “Hybrid Approach in Secure Data Communication. Read More...
|
Computer Science and Engineering |
India |
246-249 |
66 |
Moving Car Detection using HOG features
-Patel Krupaben Pravinkumar ; Manish I. Patel
Vision is the most powerful sense of the five human senses. This paper proposes real-time monocular-vision based techniques for the multiple car detection. Car detection system should minimize driving difficulties in various conditions, like in sleeping, busy in communication devices etc., thereby reducing traffic accidents. Histogram of Oriented Gradients (HOG) and Support Vector Machine (SVM) are used in this work. SVM is the classification method. HOG will extract the features of given frames extracted by video and that important features will be given to the SVM. Before that we have to give training dataset to SVM to train it, because SVM is supervised learning algorithm. According to training it will classify data and accordingly present or absent of car is decided. Simulation results are presented for different images, which show accuracy of suggested approach. Read More...
|
Electronics & Communication Engineering |
India |
250-254 |
67 |
Tumor Detection using Particle Swarm Optimization to Initialize Fuzzy C-means
-Paras Patel ; Manish Patel
Image processing techniques are extensively used in different medical fields for earlier detection and treatment stages, where time factor is more important to find abnormality issues in target images in several tumors. Now a days tumor is discovered at advanced stages with the help of Magnetic Resonance Imaging (MRI).This paper proposes an approach which combines the Particle Swarm Optimization (PSO) techniques and Fuzzy C-Means (FCM) algorithm to perform image segmentation on Magnetic Resonance Imaging (MRI).The FCM algorithm has some limitations that it requires initialization of cluster centroids and the number of cluster. In this work, the PSO techniques is applied to the MRI medical images for the purpose of initialization of cluster centroids, which could overcome the requirement of manual initialization of FCM algorithm. Natural Computing (NC) is a novel approach to solve real life problems inspired in the life itself. A diversity of algorithms had been proposed such as evolutionary techniques and particle swarm optimization (PSO). This approach, together with fuzzy c means (FCM), give powerful tools in a diversity of problems of optimization, classification, data analysis and clustering. Read More...
|
Electronics & Communication Engineering |
India |
255-259 |
68 |
College Schedule Notification Using Cross Platform
-Harshali Vinayak Lokare ; Shivani Ravindra Kand; Amit kumar Yadav
Mobile device and mobile computing have made tremendous advances and become ubiquitous in the last few years. Native approach of mobile development still is the predominant way to develop for a particular mobile platform, recently there is shifting towards the development of cross platform mobile application. In the traditional system we don’t usually provide notification to the user only a border view of schedule is displayed. In this proposed system we will provide notification to the user about their schedule. With the result of the survey, it is argued the web based approach and in particular hybrid approach of mobile development serves the best for cross platform development. Using the hybrid approach a prototype of application has also been developed and built into native application for different platforms. This has helped to get a better in site about the domain of cross platform development; its main advantage is of unification of the development and testing process. In this, there will be a message send to the user about different lectures, practical, exams, assignments and college events. Other than this if there is any message to be conveyed to the students, it can be done. This system will be platform independent built on cross platform. The main focus is to have single source code for all the mobile operating systems. In an era where application developers today aim to maximize target reach Cross platform mobile application development shows us the path by truly providing a "Develop One Time, Deploy Anywhere Anytime" solution. Read More...
|
Computer Science and Engineering |
India |
260-266 |
69 |
A Review on Design and Analysis of Stainless Steel Sandwich Structure
-KAMLESH GANRAJ AMBULE ; Dr. KISHOR P. KOLHE
The demand for bigger, faster and lighter moving vehicles, such as ships, trains, trucks and buses has increased the importance of efficient structural arrangements. In principle two approaches exist to develop efficient structures: either application of new materials or the use of new structural design. A proven and well-established solution is the use of composite materials and sandwich structures. In this way high strength to weight ratio and minimum weight can be obtained. The sandwich structures have potential to offer a wide range of attractive design solutions. In addition to the obtained weight reduction, these solutions can often bring space savings, fire resistance, noise control and improved heating and cooling performance. Laser-welded metallic sandwich panels offer a number of outstanding properties allowing the designer to develop light and efficient structural configurations for a large variety of applications. These panels have been under active investigations during the last 15 years in the world. Outokumpu has been participating in several collaborative projects in this area. In Finland the research related to all steel sandwich panels was initiated in 1988 in the Ship Laboratory of Helsinki University of Technology. Read More...
|
Mechanical Engineering |
India |
267-270 |
70 |
In Big Sensor Data Detecting & Localization of Errors
-HEENA KAUSAR ; SMITHA KURIAN
Huge information contains huge or gigantic accumulations of information, originating from mutually manufacturing and exploratory examination resources anywhere information created through major degree and speed which hard to prepare by utilizing available database administration devices or customary information handling applications. Distributed computing gives promising stage to bolster this test as it gives an adaptable pile of gigantic registering, stockpiling, and programming administrations in a versatile way with an ease. As of late a few strategies have been created for handling sensor information on cloud, known as sensor-cloud. Be that as it may, these strategies don't give proficient backing on quick recognition and situating of errors in enormous sensor information sets. For quick information mistake identification in enormous sensor information sets, in this, a methodology is produce for information errors discovery which misuses the full calculation capability of cloud stage and the system highlight of WSN. A methodology is, characterized an arrangement of sensor information mistake sorts and afterward characterized. Taking into account that arrangement, the system highlight of a grouped WSN is acquainted and examined with bolster quick mistake discovery and area. In our proposed approach, the error discovery depends on the without scale system topology and the vast majority of recognition operations can be led in restricted worldly information hinders rather than an entire huge information set. Subsequently the identification and area procedure can be drastically quickened. Furthermore, isolating the assignment of identification and area to cloud stage which completely misuse the calculation power and gigantic stockpiling. Read More...
|
Computer Science and Engineering |
India |
271-273 |
71 |
ARM based Real Time Car Security System using Fingerprint and Face Detection Technique
-Hrituja R. Bari ; Prof. Pramod S. Aswale; Darshan L. Bagmar; Amol S. Bhosale
In day today life as the population is increasing rapidly, the demand for vehicles is also increasing. Also the problem of theft is increasing with a great speed. Hence vehicle theft has been a severe problem around the globe along with professional thieves. The existing systems that are used like car alarms and flashing lights can just indicate the car being stolled. But it does not prevent the car from being stollen. Recent security techniques can be deceived by the thieves so this leads to the need for biometric authorization techniques. Once the vehicle is lost there is no way to find it back. In this proposed system, we are developing a vehicle security system which will automatically disable the ignition for unauthorized drivers. The system will automatically capture the images of the person driving and will compare them with the saved data, if he is authorized then the vehicle will be accessed and if the person is unauthorized then he won’t be able to access the car. Also facility will be provided for the owner who will receive image of the thief via multimedia message service and the location of the car through global system positioning. This system will enable the owner to track the vehicle and the thief. This will prevent the vehicles from being getting stolen. Read More...
|
Electronics and Telecommunication Department |
India |
274-277 |
72 |
A Study on Rural Road Widening Project Based on Prediction of Traffic Volume - A Case Study in Rajkot Morbi State Highway 24
-A. M. Mathakiya ; P. A. Shinkar
In India, traffic flow is a mixed traffic characteristics and also the traffic congestion is the common problem in most major cities in India. Two-lane roads represent the majority of the highway system in India. The analysis of traffic performance on two-lane roads is critical for their planning, design, maintenance, rehabilitation, and operation. Performance evaluation is typically carried out with the capacity analysis for various highway facilities. In Rajkot Morbi state highway 24 the stretch 5 km to 15 km total 10 km is selected in this stretch same problem occurring like mixed traffic, traffic congestion, speed reduction and chances of accident due to insufficient width of road. In this paper road inventory data and traffic volume survey has been carried out, maximum PCU/Day of three days traffic volume survey is 25843. And IRC: 64-1990 “guideline for the capacity of rural road†is recommended for 2 lane rural road is 15000 PCU/day. So the data was compared with IRC: 64-1990, and the road widening has been justified the Rajkot Morbi state highway 24 is needed to widen. Read More...
|
Civil Engineering |
India |
278-279 |
73 |
Effect of Guar and Xanthan Gum Biopolymer on Soil Strenghtheing
-Patel Krupalbahen Chandubhai ; Prof. A.J.Shah
Natural biopolymers discussed as environmentally friendly and sustainable grouting chemicals. This paper presents guidelines for selecting potentially useful biopolymers for strengthening cohesionless soil. Guar and Xanthan were identified for the study over a range of concentration (0.5%, 1%, 1.5%). Unconfined compressive strength test performed for sand treated with various percentage of biopolymer for various water content and air dried of 3, 7, 28 days. The guar and xanthan create gel matrices and indirectly with the sand particles on surface (e.g. coating), between particle-to-particle contacts (e.g. cementation). Strengthening effect of Guar and xanthan gum was shown to have greatest effect on poorly graded sand with fine particle and with air drying periods. Read More...
|
Civil Engineering |
India |
280-283 |
74 |
Named Entity Recognition for English Tweets using Random Kitchen Sink Algorithm
-Abinaya N ; Saranya S S
The information obtained electronically is vast and difficult for users to access the exact information within permissible time. The various Natural Language Processing (NLP) task has been carried out in the ï¬eld of Artiï¬cial Intelligence (AI) to extract structured information from this large amount of unstructured data. Named Entity Recognition (NER) is one such Information Extraction (IE) system which identiï¬es the elements such as name of person, location, organization, quantities, time expressions etc. and classify into set of pre-deï¬ned classes. In this thesis, language independent system is developed using Machine Learning algorithms such as Conditional Random Field (CRF), Support Vector Machine (SVM) and Random Kitchen Sink (RKS). A unique approach has been carried out in implementing Random Kitchen Sink algorithm for Named Entity Recognition. This paper deals with RKS for English tweets. The accuracy for this system is obtained as 82.60%. Read More...
|
Computer Science and Engineering |
India |
284-287 |
75 |
Ultracapacitor Application in Electric Vehicles for Regenerative Braking of DC Motor
-Meenakshi S. Bawankar ; S.K. Umathe; Dr. S.G. Tarnekar
In electric vehicle the regenerative break used to charge the battery and increase the charging range of the vehicle. Quantity of energy is depends upon the vehicle. Heavy and large vehicle can save large amount of energy. And getting a best saving of energy. Ultracapacapacitor is used to stored energy and having large capability than that of the normal capacitor.Now the latest technology used in industry with the regenerative braking is increased. The output of regenerative braking is used to improve by connecting the battery and ultracapacitor with dc-dc converter. And the controller is used to divide the amount of current and improve the efficiency of the system.Here work is done for the parallel combination of the battery and Ultracapacitor focusing on the Regenerative braking using dc motor. This recombination is used to store the energy using MATLAB simulation. During braking energy is stored into the battery and Ultracapacitor. Read More...
|
Electrical Engineering |
India |
288-290 |
76 |
ARM7 Based Bus Arrival Intimation System
-Prashant G. Salunkhe ; Bhavik B. Keswani; Pratiksha P. Daspute; Sanket S. Keskar; Bhagyashri K. Deore
In public city bus transport association has become a major delay issue even with the advancements in the technological generation being upgraded a demand for an updated intimation system was developed which would augment the existing set-up of public city bus transport system. Improvisation over modern trends led us to sculpt the reason of paper on an embedded system based on GSM & RFID technology which will encounter these problems faced during presence/absence of bus at bus station. Buses from the former station will inform the next station and announcement will be made regarding the status of the bus from the former station through a GSM service integrate this idea into trans-receiver stations and announcing the mechanism moving towards it. Read More...
|
Electronics and Telecommunication Department |
India |
291-294 |
77 |
Bit Error Rate Improvement in MIMO Using Software Defined Radio
-VAGHELA BHOOMIKABEN KHUSHALBHAI ; Prof.H.G.BHATT
MIMO systems have recently combining as one of the most promising technology in wireless communication systems in achieving high data rates and improve system performance. We aim at the study of a communication system that employs MIMO-SDR and adaptive modulation technologies. Error performance and spectral efficiency can be improved by different modulation techniques with MIMO system. The simulation result have been obtain in MATLAB platform. The BER performance has been analyzed for BPSK, QPSK, 8QAM, 16 QAM and 32 QAM.Software Defined Radio (SDR) to implement the radio communication process simply with software. Software Defined Radio (SDR) used in MATLAB to work as switching for different modulation techniques. Software Defined Radio (SDR) can easily to sophisticated coding and modulation techniques. Read More...
|
Electronics & Communication Engineering |
India |
295-297 |
78 |
Feature Subset Selection for High Dimensional Data Based On Clustering
-Prof. Sarika Zaware ; Asmita Orpe; Heena Shaikh; Pooja Rokade; Sheefa Shaikh
Feature selection is the process of examining, evaluating and extracting required data which can be clustered into subsets which contain and retain the integrity of original data. A feature selection algorithm should be adept and productive. Adept means minimum time required and productive means quality of generated subset is not compromised. Our system proposes an algorithm which consists of following steps: Markov Blanket, Shannon Info gain, Minimum Spanning Tree, Tree Partition, Gaussian distribution, Bayesian Probability. Applying these steps we get the desired subset from the clusters. Our system ensures to remove irrelevant data along with redundant data which most of the systems fail to eliminate. Irrelevant features are the extraneous features or data objects, whereas the redundant ones are the repetitious features. These data objects tend to consume memory and do not contribute in generating accurate results. Read More...
|
Computer Engineering |
India |
298-301 |
79 |
Investigation of impact of Fly Ash as a Filler in bituminous Mix- An overview
-Shakti Kumar
In bituminous paving mixture, normally cement and stone dust are utilized as filler material. For comparison, cement used to prepare control mix. Marshall Stability test is employed to find stability, flow value, % air voids, (VMA) voids in mineral aggregate and (VFB) voids filled with bitumen properties for a bituminous paving mixture. The work is carried out by using specifications as per MORTH (Ministry of road transports & highways, specifications for road & bridge works, 5th revision). By replacing the cement with fly ash at the levels 25%, 50%, 75%, 100% the results are compared. The difference of properties like optimum bitumen contents and optimum fly ash contents are determined. It has been recommended to use of fly ash, not only reducing the cost of execution, also solve utilization of fly ash and its disposal problems. Read More...
|
Civil Engineering |
India |
302-304 |
80 |
Soft-Switching DC-DC Converter for Energy Applications
-MOHIT PAPRIKAR ; AKASH GUPTA
A new Zero-Voltage Transition based two input DC-DC converter sufficient to draw power from two distinct sources feeding a common dc-bus is presented in this paper. This converter belongs to higher-order family and behaves as buck converter for one dc source also it acts as both buck and boost converter with the other source. The significant feature of the proposed converter is that both the sources either singly or simultaneously supply power to the subsequent load at minimal ripple current. This feature is particularly attractive for photo-voltaic power processing applications. The main objective here is to realize the soft-switching by integrating the ZVT cell into the two input DC-DC converter enabling to improve the efficiency by reducing the switching losses in the converter. The digital voltage-mode controller for the converter is designed using SISO tool in MATLAB. A 24V, 96W converter is analyzed and compared with the simulation results. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
305-307 |
81 |
Optimization of Surface Roughness in CNC Turning of Aluminum alloy ENAC 43400 Using Taguchi Method
-SHUBHANGI SAMADHAN TAYDE ; S. A. SONAWANE
In Computer Numerical Control (CNC) turning technology, Surface roughness is a one of the most important parameter. The aim of the work is, to obtain the optimum process parameters of turning process (cutting speed, feed rate and depth of cut) which results in an optimal of surface roughness for machining aluminum alloy ENAC43400, as a work piece material with carbide cutting tool in a CNC lathe machine. The effect of various cutting parameter for surface roughness of ENAC 43400 work material in turning operation L9 orthogonal array based Taguchi optimization technique is used for optimization of process parameters of CNC. The surface roughness is measured by using the surface roughness tester (Mitutoyo surftest-SJ210). Design of experiments (DOE) were conducted for the analysis of the effective turning parameters on the surface roughness by using Taguchi design and then optimize these results using Analysis of Variance (ANOVA), to find the optimal value of surface roughness. The feed rate and depth of cut values are set as low for the result of optimum surface roughness whereas speed was the most influential process parameter. Read More...
|
Mechanical Engineering |
India |
308-310 |
82 |
Performance Evaluation of Water Treatment Plant At Midc Hingna, Nagpur : A Case Study In India
-Ajay S.Mahinge ; Isha P.Khedikar
The water treatment plant is important for quality of water supplying to the society. There is necessity to evaluate performance of water treatment plant (WTP) for proper treatment of water. The study was carried on performance evaluation of water treatment plant located at Maharashtra Industrial Development Corporation (MIDC), Hingna, Nagpur , Maharashtra state India. Performance was analyzed through the physico-chemical parameters viz. turbidity, temperature,total solids, suspended solid, Total Dissolve Solid, pH, D.O and Residual Chlorine. The parameters were analyzed and monitored on weekly basis. The result showed that Dissolve oxygen was increased after aeration unit up to 50 %. overall turbidity removal in clariflocculator in 77.30% but, and filtration unit is 60%. Read More...
|
Environment Engineering |
India |
311-314 |
83 |
A review on Task Scheduling in Cloud Computing
-Garima Panwar ; Dinesh
Cloud computing, uprising in information technology (IT) industry suitable due to its growing performance, openness, low cost services compared to existing online computing and storage process. Cloud computing provides a massive storage for data and quick computing services over the internet. Cloud computing is a type of distributed computing where services being provided by outlying vendors through internet providing high performance gain to the users and also providing benefits to the Cloud Service Provider (CSP). To achieve this goal many problems have to be faced. Task Scheduling is one of them which are concerned with searching for optimal (or near-optimal) real-time and predictive schedules subject to a number of constraints". This survey is done on various task scheduling categories of various task of scheduling algorithms. Read More...
|
Computer Science and Engineering |
India |
315-318 |
84 |
Flexible Thermal Link for Space Based Cryocooler: A review
-Amar Nath Ojha ; Jaspal.B.Dabhi; Jigneshsinh M Rathod
Flexible Thermal Link plays very crucial role in the cryogenic component for transfer the heat. The purpose of these links is to provide a means of transfer the heat from a hot surface of cryocooler to the cold reservoir. Because of high heat dissipation component in cryocooler, skin temperature of cryocooler increases and it can be reason for lowering performance and reduce its life during work in satellite. Therefore flexible thermal link should be good in thermal performance in other low thermal resistance and also should have enough flexibility. This could maintain skin temperature of cryocooler and resist the vibration which comes on the cryocooler in satellite. Also flexible thermal link should have its flexibility, durability, and mass constraints. The present states of developments of flexible Thermal Links for space based cryocooler are reviewed in this paper. In the past years new research on these flexible thermal links has developed to vitally improve them and make suitable for even more applications. Read More...
|
ELECTRICAL AND MECHANICAL ENGINEERING |
India |
319-321 |
85 |
Visibility analysis of Satellite based Automatic Identification System (SB-AIS)
-Gondaliya Neha D. ; prof. Rajesh C. Sanghvi
AIS (Automatic Identification system) is an automatic and autonomous vessel tracking and identifying system that uses maritime VHF frequency band. AIS was developed for collision avoidance mainly. AIS transmit GMSK modulated signal using self organized form of TDMA. Its communication range is limited to 40 NM. SB-AIS can be proposed to overcome this limitation and create global surveillance. AIS signal strength can be received at LEO satellite up to 1000 km. satellite is not continuously visible to ships. So that is required to do visibility analysis. MATLAB simulation is done to find all parameters like path loss, received signal power, Doppler frequency, within visible duration only. Read More...
|
Electronics & Communication Engineering |
India |
322-324 |
86 |
Cleaning Robot Based on PIC Controller
-Naman Aggarwal ; Swati Pawar; Piyusha Chaudhari; Akshay Mahalkar; Anshul Mishra
In this paper, we implemented a human-friendly cleaning robot system for the domestic ubiquitous environment. Though conventional automatic cleaning robots already exist, these robots do not work in sync with humans. These robots' cleaning operations often obstruct a person in the home. Therefore, a robot that does not interfere with human activity in the home is required. What indicates human activity most in the home is the usage status of home appliances such as electrical appliances, doors, and lights. In our system, a robot can identify where humans are active by receiving the usage status of home appliances via a network. The usage status of home appliances changes the robot's running pattern and consequently the robot avoids humans and cleans without causing obstruction. We conduct an operational experiment of our prototype system in a room in which some sensors are installed to create an experimental environment. We then measure the execution time of the prototype system. From the results of experiments, it is found that a cleaning robot system which works through interaction with equipment in the home and does not disturb humans can become a reality. Read More...
|
Electronics and Telecommunication Department |
India |
325-327 |
87 |
Use of Iron Slag in Paver Block
-Abhishek Kumar
In these days the make use of concrete Paver Block in road pavement is broadly used. Such a moment concrete Paver Block is improved option in road building as compared to the conservative road which is complete by bitumen with gravel in a cost vision of point and better fitness. India is a increasing country so at this time the construction of road and building plays an important position. At the present days nearly all of the work related with construction or roadway is complete by cement concrete design mix. In this theory I have design paver block by with Cement Concrete mixture of Design Mix M20 which is complete of 10mm Coarse Aggregate, OPC 43 Grade Cement with Fine Aggregate and paver block is of measurement 200 x 160 x 80 mm. In this procedure use the partial substitute of Cement by Iron Slag in percentage of 0%, 5%, 10%, 15%, 20%, 25%,30%And 40% respectively and also, supplementary Gypsum constantly 2% by mass of cement in total mix of Cement Concrete. Super plasticizer is use as an admixture which is added 2% by weight of cement constantly in the production of concrete combination. The purpose of this admixture is in the direction of reduce the water cement ratio. The Paver Block curing procedure is done for 28 days respectively to discover its compressive strength. The main point of this thesis is to make use of waste products similar to Iron Slag for the making of Paver Block which will of use in construction. Read More...
|
Civil Engineering |
India |
328-331 |
88 |
Liveness Detection for Biometric System using Image Quality Assessment
-Namrata Shinde ; S. V. Shelke; Manisha Ghare; Shubhangi Shingade
To verify the actual presence of real biometric sample in contrast to reconstructed (fake) samples is a major problem in biometric authentication, which needs the development of new and efficient protection method. In this paper we present a software based liveness detection method which can be used in different biometric systems to detect different types of fake attempts. The aim of the proposed system is to increase the security of the biometric system by adding live ness assessment using image quality assessment (IQA). The proposed system is less complex which is suitable for real time applications, by using general image quality features extracted from one image to differentiate between real and fake samples. Read More...
|
Electronics and Telecommunication Department |
India |
332-333 |
89 |
Retrofitting of RCC Beam in Flexure by External Cabling Method
-Sunil Kumar Chaurasia
In the world most of the RCC structures are damage before their service period due to several causes such as seismic forces like earthquakes, sudden impact load and improper structural design. Sometimes the whole replacement of structure is not possible because of high cost and time taking problem. In such a condition retrofitting technique for the damaged portion of the structure is more significant solution for strengthening the structures. Different retrofitting techniques are applied to strengthen the structure as their ease of uses. The retrofitting of RCC beam by external cabling method is very effective and rapid technique for strengthening the structure in both flexure and shear. In this investigation the external reinforcing steel bar as a cable was used for strengthening the RC beam in flexure only. Three number of RCC beam i.e. control beam of size 1800mm length, 100mm width and 150mm overall depth were casted for experimental study. The loads were applied at centre of each beam up to cracking and then up to failure point and load deflection for each beam were obtained. Then reinforcing steel bar was externally applied at top and bottom face of the each damaged beam. The effect of retrofitting by external reinforcing steel bar on RC beam was investigated. Read More...
|
Civil Engineering |
India |
334-336 |
90 |
Hydraulic Design of Safe Bridges
-MOHD AZAM KHAN
This paper presents the reason of bridge failure and tells how to make bridge safer. In this paper it is illustrated mainly the reason of hydraulic action of bridge failure and provide the solution of the problem. Since bridge is a very important structure in civil engineering field so it needs a great attention toward it, for constructing a new safe bridge at any location it is important to analyse and collect the data of analysis. After analysing the execution must be done according to the results and data available. The Bridge designed in this way will always serve people. In this paper all relevant reason of failure and its countermeasure are discussed. In earlier era the designing of Bridges is done on the basis of previous experiences, but due to some accidental failure of Bridges it was seen the need of manuals and guidelines. So, that’s why now a days construction of new bridges is done according to these manuals. In this paper some of them are discussed. Read More...
|
Civil Engineering |
India |
337-340 |
91 |
Detecting Duplicate Nodes in Wireless Mesh Networks
-Saranya R ; Prianka.R.R; Ranjith kumar.M
Wireless mesh networks (WMNs) have emerge as a key technology for next creation wireless networking. Because of their reward over other wireless networks, WMNs are undergoing rapid progress and moving various applications. Peer-to-peer communication for the entire client who are spread over some area. Since the users are connected in a wireless multi-hop passion complete ubiquity is provided. Network is increasing there could be a chance of experience more intrusion by each client due to the communication link of every other user. So in a wireless mesh network as the load increases the throughput of group is going to be decreased due to wireless intrusion by other users. WMN with reactive optical network (PON). The ensuing hybrid network (Optical-wireless network) could reduce the wireless hops of each user, so that we can reduce the total wireless interference practiced by each user resulting in improved network throughput. This paper means to study the network throughput gain in Optical-wireless network theme to peer-to-peer interactions. Read More...
|
Computer Science |
India |
341-343 |
92 |
A Mining Cluster Based Temporal Mobile Sequential Patterns in Location Based Service Environments using CTMSP Mining
-Shamshedbanu M ; Naveen Kumar S
Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is the mining and prediction of users’ mobile commerce behaviors such as their movements and purchase transactions. The project proposes a novel framework, called Mobile Commerce Explorer (MCE), for mining and prediction of mobile users’ movements and purchase transactions under the context of mobile commerce. The proposed framework is termed as MCE (Mobile Commerce Explorer) which consists of three major components: 1) Similarity Inference Model (SIM) for measuring the similarities among stores and items, which are two basic mobile commerce entities considered in this paper; 2) Personal Mobile Commerce Pattern Mine (PMCP-Mine) algorithm for efficient discovery of mobile users’ Personal Mobile Commerce Patterns (PMCPs); and 3) Mobile Commerce Behavior Predictor (MCBP) for prediction of possible mobile user behaviors. In addition, researches on Location-Based Service (LBS) have been emerging in recent years due to a wide range of potential applications. One of the active topics is the mining and prediction of mobile movements and associated transactions. Read More...
|
Computer Science and Engineering |
India |
344-348 |
93 |
A Review on Mining of High Utility Item Set
-Nita Parmar
we studied some algorithms based on utility mining. In this paper we will discuss the pros and cons of this algorithm. So we are putting forth an algorithm which will solve the problem of previous algorithm. Here we are finding the high utility pattern and frequent pattern by using UP Growth++ algorithm and FP growth algorithm for e commerce domain; it will be used on real time data base system. Read More...
|
Computer Science and Engineering |
India |
349-351 |
94 |
Intrusion Detection Using Packet Sniffer
-Tauseef Ahamed ; Sapan Vij; Prashant Kumar; Mr. Rishabh jain
Network Intrusion Detection and Prevention system works on analyzing the packets coming and going through the interface. Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. Depending on the network structure one can sniff all or just parts of the traffic from a single machine within the network. With the development and popularization of network Technology, the management, maintenance and monitoring of network is Important to keep the network smooth and improve Economic efficiency. For this purpose packet sniffer is used. This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux (KALI) platform and its use for Intrusion Detection. Focus has also been laid to analyze the bottleneck scenario arising in the network, using this self-developed packet sniffer. Before the development of this indigenous software, minute observation has been made on the working behavior of already existing sniffer software such as wireshark (formerly known as ethereal), tcpdump, and snort, which serve as the base for the development of our sniffer software. For the capture of the packets, a library known as libpcap has been used. In development of this software we incorporated an additional feature that was not in the original one viz. Sniffer Uploading. Read More...
|
Computer Science and Engineering |
India |
352-356 |
95 |
Lemon Disease Detection Using Image Processing
-Rohit Ranjan
In India, Fruit disease detection in done using naked eye by an expert and the charges of an expert is too high so that farmer cannot afford an expert. This system will help to reduce the cost as well as time. In the proposed system, Image of fruit is pre-process then the feature extracted and then classification is done. The result of proposed system displays the name of disease name. This system will help the farmer to increase the cultivation of lemon fruit. Read More...
|
Electronics & Communication Engineering |
India |
357-359 |
96 |
Intelligence of IOT for Smart Home Automation using Arduino
-Akshay Pardeshi ; Shruti Bhadane; Rohidas Potangale; Hitesh Kudale; Trupti Gurav
Now a day the embedded system and Internet of Things (IoT) has been a most popular research area. The embedded system which is assembled and developed for the dedicated tasks and the IOT where many things are connected to each other for communication are facing many technical and application problems. As this project is concern with the Arduino, Arduino is an open source computer hardware and software combinations developed for doing dedicated task with low computing power and low energy consumption. The objective of the survey is focused on the loopholes arising out of information exchange technology used in internet of things and embedded systems. Finally, the important research issues are addressed for the researchers to find the way for further research in the embedded system. Read More...
|
Computer Engineering |
India |
360-361 |
97 |
Twitter sentiment Analysis for electronic Goods Recommendation
-Neha Jadhav ; Dipti Shilimkar; Pooja kshirsagar; Nikhila Lodh
Twitter, Facebook and other social networking sites are the main source of data for analysis of product. Twitter is the most common micro blogging site which fetches the millions of tweets that are generated every minutes and every seconds. These tweets can be useful for sentiment analysis and analyzing users opinion about the particular product. And also enable the product manufacturing companies to gain the feedback about their product to improve the product quality. In this paper we are fetching the tweets about electronic goods e.g. Laptop, Mobiles etc. form the twitter account and by analyzing those tweets we are recommending the best product to the user. Read More...
|
Computer Engineering |
India |
362-363 |
98 |
Fully Connected Artificial Neural Network based approach for Face Detection
-Sachin Bansal ; Shubham Varshney
In this work, A Neural Network based approach is presented to detect upright frontal faces in an image. The Neural Network used is a fully connected network with 3 layers. This network examines 20x20 sized windows in an image, and decides whether it contains a face or not. For the negative face examples, we use bootstrap method. After an initial small dataset of non-face examples, we add false detections to the training set as the training progresses. Simple heuristics, like merging overlapping and arbitrating between multiple neural networks can further increase the accuracy of the model. Read More...
|
Computer Science |
India |
364-366 |
99 |
Web Page Pattern Prediction Model Based on Dynamic Apriori Algorithm
-Nisha Soni ; Pushpendra Kumar Verma
Web usage mining deals with understanding user behavior in interacting with a Web site or with the Web. The goal of Web usage mining is to discover Web page navigation pattern, which predicts the path of Website visitors. This navigation patterns are discovered using various techniques available for Web log mining. The accuracy of this navigation patterns are dependent on the quality of the Web log data hence, pre-processing of Web log files are necessary before application of specific technique for Web log mining. In this paper we propose a Web page navigation pattern mining approach using Apriori algorithm with dynamic programming approach. This dynamic programming approach of Apriori algorithms helps in utilizing memory space and minimizing execution time. Read More...
|
Computer Science and Engineering |
India |
367-369 |
100 |
High Speed Multiplier Design with Column/Row Bypass Method and Tabulation Multiplication
-Ruhi Samaiya ; Ankit Shivhare; Ashish Raghuwanshi
in most of the digital signal processing operations such as linear convolution, circular convolution, cross correlation, auto correlation, discrete Fourier transform, fast Fourier transform etc multiplication operation takes large time for computation. The multiplication is also time consuming process in microprocessor and microcontroller arithmetic and logical operations. The computational time of multiplication operation depends on the speed of adder circuit which is affected due to the carry propagation delay. In this paper the Tabulation method of multiplication is discuss. The tabulation method of multiplication reduces the complexity of multiplication and its computational time. This will improve the computational time, latency and throughput. Read More...
|
VLSI Design and Embedded System |
India |
370-371 |